Using Kerberos Applications (Tasks)

This chapter is intended for anyone on a system with the Kerberos service
configured on it. This chapter explains how to use the “Kerberized” commands and
services that are provided. You should already be familiar with these commands (in
their non-Kerberized versions) before you read about them here.

Because this chapter is intended for the general reader, it includes information on
tickets: obtaining, viewing, and destroying them. This chapter also includes information on choosing
or changing a Kerberos password.